Race Against Time

What to do when zero-day attack strikes


Three words are often associated with a zero-day attack – vulnerability, exploit and attack.

Given that no software patch exists for a zero-day vulnerability, it’s a tempting target. Once an exploit is created, an adversary can use it to carry out a zero-day attack. What happens then?

Join us for a special edition of “Race Against Time”, a simulated attack scenario spotlighting the critical steps SOC teams need to take in the first hours of a zero-day exploit.

You will learn how to effectively counter zero-day attacks at any stage of the lifecycle – from discovering a vulnerability to stopping an exploit in its tracks to responding to an actual attack.